Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
383-4-188
Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
383-4-297
name Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
not_valid_before 2012-08-10 2014-09-03
not_valid_after 2018-04-19 2019-09-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-sec-eng.pdf
security_level EAL3+, ALC_FLR.3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-cert-eng_0.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-297%20cert%20original%20signed%20v1.0%20e.docx
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': frozenset({'PP_ND_V1.1'})})
state/cert/convert_garbage False True
state/cert/download_ok False True
state/cert/pdf_hash None a5039c62b206635ea685e0e7d995f341f1e42a161fe4fdba27ab8a4b00db6fef
state/report/pdf_hash 9c6dae203d11062a123ce73a602e77a238100532c4de58d8c92aab57caaf17e8 8461157688ea353be47c4b06f5b99534cc237874f69df25d9e7a9f582cb12e3e
state/report/txt_hash 050a2ce508f42fc934a825f4bc666b440b35baf1f6794c567182b30e29178252 0a291361fbb60bcce4138854492bafb2e5fc2eb3aedb6c5a52e18d04b2e31924
state/st/pdf_hash f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861 4f9299720df9b2f13cdf5d674b01296a8187b681dcce5f29d9b4cc4d92ffe750
state/st/txt_hash 2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5 d9088a672b8ea4f5079d7cbfbde5e53d236e6e72d6a71551c8071e8340994283
heuristics/cert_id 383-4-188 383-4-297
heuristics/cpe_matches cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:* None
heuristics/extracted_versions 10.4 13.2, 1.8, 13.3
heuristics/related_cves CVE-2022-22156, CVE-2023-44177, CVE-2023-44201, CVE-2023-44178, CVE-2024-21591, CVE-2022-22215, CVE-2022-22208, CVE-2023-36843, CVE-2024-39549, CVE-2023-36841, CVE-2022-22242, CVE-2014-3818, CVE-2014-2712, CVE-2023-28964, CVE-2022-22181, CVE-2023-44197, CVE-2022-22224, CVE-2004-0468, CVE-2013-4686, CVE-2021-31372, CVE-2023-44184, CVE-2022-22220, CVE-2014-0616, CVE-2022-22245, CVE-2023-22406, CVE-2013-7313, CVE-2024-39528, CVE-2021-31362, CVE-2023-28962, CVE-2023-28979, CVE-2022-22246, CVE-2022-22244, CVE-2023-44194, CVE-2013-4689, CVE-2022-22241, CVE-2014-2714, CVE-2022-22238, CVE-2022-22162, CVE-2023-44186, CVE-2014-0615, CVE-2024-21594, CVE-2013-6618, CVE-2022-22197, CVE-2023-36842, CVE-2023-28963, CVE-2013-6170, CVE-2022-22243, CVE-2023-44182, CVE-2004-0230, CVE-2022-22163, CVE-2023-22395, CVE-2023-44185, CVE-2023-36839, CVE-2023-36840, CVE-2023-44176, CVE-2019-0036, CVE-2014-0613, CVE-2022-22214, CVE-2023-44175, CVE-2023-4481, CVE-2022-22173, CVE-2023-22407, CVE-2023-28975, CVE-2013-6014, CVE-2023-22391 None
pdf_data/cert_filename None 383-4-297 cert original signed v1.0 e.docx
pdf_data/report_filename 383-4-188 CR v1.0e.pdf juniper-network-v133r18-cert-eng_0.pdf
pdf_data/report_frontpage/CA/cert_id 383-4-188-CR 383-4-297-CR
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/cc_cert_id/CA
  • 383-4-188-CR: 1
  • 383-4-297-CR: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3+: 2
    • EAL 3: 4
    • EAL3+: 1
    • EAL 3 augmented: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_STG_EXT.1: 1
  • FCS:
    • FCS_CKM_EXT.4: 1
    • FCS_RBG_EXT.1: 1
    • FCS_SSH_EXT.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 1
    • FIA_UIA_EXT.1: 1
    • FIA_UAU_EXT.2: 1
  • FPT:
    • FPT_SKP_EXT.1: 1
    • FPT_APW_EXT.1: 1
    • FPT_TUD_EXT.1: 1
    • FPT_TST_EXT.1: 1
  • FTA:
    • FTA_SSL_EXT.1: 1
pdf_data/report_keywords/crypto_protocol/SSH/SSH 3 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 197: 1
    • FIPS 186-2: 1
    • FIPS 180-2: 1
    • FIPS 198: 1
    • FIPS 180: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 64990
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: User
  • /CCEF: CGI IT Security Evaluation & Test Facility
  • /CR date: 10 August 2012
  • /CR version: 1.0
  • /Certificate date: 10 August 2012
  • /CreationDate: D:20120810083649-04'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer name: Juniper Networks, Inc.
  • /Document number: 383-4-188-CR
  • /ETR title, version, date: Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,
  • /Evaluation completion date: 30 July 2012
  • /ModDate: D:20120810083654-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ST Title: Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5
  • /ST date: 11 July 2012
  • /ST version: Version 2.2
  • /SourceModified: D:20120809122721
  • /Sponsor: Juniper Networks, Inc.
  • /TOE Version: 5.0
  • /TOE name and version: Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
  • /TOE short name: JUNOS® 10.4R5
  • /Title: EAL 3 Evaluation of <TOE name and version>
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 267190
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: krshann
  • /CreationDate: D:20141001151624-04'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20141001151743-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
  • pdf_hyperlinks:
pdf_data/report_metadata//Author User krshann
pdf_data/report_metadata//CreationDate D:20120810083649-04'00' D:20141001151624-04'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 9.0 for Word Microsoft® Office Word 2007
pdf_data/report_metadata//ModDate D:20120810083654-04'00' D:20141001151743-04'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Microsoft® Office Word 2007
pdf_data/report_metadata//Title EAL 3 Evaluation of <TOE name and version> Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
pdf_data/report_metadata/pdf_file_size_bytes 64990 267190
pdf_data/st_filename 383-4-188 ST v2.2.pdf juniper-network-v133r18-sec-eng.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 9
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
pdf_data/st_keywords/cc_claims/A
  • A.LOCATE: 4
  • A.NOEVIL: 3
  • A.EAUTH: 2
  • A.TIME: 4
  • A.CRYPTO: 4
  • A.NWCOMP: 2
  • A.NO_GENERAL_PURPOSE: 1
  • A.PHYSICAL: 1
  • A.TRUSTED_ADMIN: 1
pdf_data/st_keywords/cc_claims/O
  • O.FLOW: 11
  • O.PROTECT: 15
  • O.EADMIN: 8
  • O.ACCESS: 14
  • O.ROLBAK: 6
  • O.AUDIT: 13
  • O.CONN: 6
  • O.PROTECTED_COMMUNICATIONS: 1
  • O.VERIFIABLE_UPDATES: 1
  • O.SYSTEM_MONITORING: 1
  • O.DISPLAY_BANNER: 1
  • O.TOE_ADMINISTRATION: 1
  • O.RESIDUAL_INFORMATION_CLEARING: 1
  • O.SESSION_LOCK: 1
  • O.TSF_SELF_TEST: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.EAUTH: 3
  • OE.TIME: 3
  • OE.CRYPTO: 3
  • OE.PHYSICAL: 3
  • OE.ADMIN: 3
  • OE.NWCOMP: 3
  • OE.NO_GENERAL_PURPOSE: 1
  • OE.PHYSICAL: 1
  • OE.TRUSTED_ADMIN: 1
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 3 1
pdf_data/st_keywords/cc_claims/T
  • T.ROUTE: 9
  • T.PRIVIL: 7
  • T.OPS: 8
  • T.MANDAT: 3
  • T.CONFLOSS: 5
  • T.NOAUDIT: 2
  • T.ADMIN_ERROR: 1
  • T.TSF_FAILURE: 1
  • T.UNDETECTED_ACTIONS: 1
  • T.UNAUTHORIZED_ACCESS: 1
  • T.UNAUTHORIZED_UPDATE: 1
  • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_FSP.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.3: 7
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_CMC.1: 1
  • ALC_CMS.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_OBJ.1: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_IND.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_VAN.1: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
    • EAL3 augmented: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_ARP.1: 6
    • FAU_SAR.1: 5
    • FAU_GEN.2: 5
    • FAU_SAA.1: 5
    • FAU_STG.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_IFF.1: 6
    • FDP_ROL.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_SOS.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.5: 5
    • FIA_UID.2: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UAU.1: 2
    • FIA_UID.2.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMF.1: 7
    • FMT_MSA.3: 10
    • FMT_MTD.1: 7
    • FMT_MOF: 10
    • FMT_MTD: 32
    • FMT_SMR.1: 5
    • FMT_MOF.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1: 3
  • FPT:
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_STG_EXT.1: 11
    • FAU_STG.1: 1
    • FAU_STG: 1
    • FAU_GEN.1: 8
    • FAU_STG_EXT.1.1: 2
    • FAU_GEN: 5
    • FAU_GEN.2: 5
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM_EXT.4: 20
    • FCS_RBG_EXT.1: 15
    • FCS_SSH_EXT.1: 14
    • FCS_TLS_EXT.1: 2
    • FCS_CKM.4: 7
    • FCS_CKM: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM.1: 19
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 46
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_CKM.1.1: 2
    • FCS_COP.1.1: 4
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 11
    • FIA_UAU_EXT.2: 11
    • FIA_UIA_EXT.1: 17
    • FIA_PSK_EXT.1: 1
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU.1: 3
    • FIA_UID.1: 5
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
  • FMT:
    • FMT_MTD.1: 5
    • FMT_SMF.1: 7
    • FMT_SMR.2: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_SKP_EXT.1: 11
    • FPT_TST_EXT.1: 11
    • FPT_TUD_EXT.1: 11
    • FPT_SSP.2: 1
    • FPT_APW_EXT.1.1: 4
    • FPT_APW_EXT.1.2: 2
    • FPT_SSP.1: 1
    • FPT_SKP_EXT.1.1: 2
    • FPT_TST.1: 1
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
  • FTA:
    • FTA_SSL_EXT.1: 9
    • FTA_TAB.1: 7
    • FTA_SSL: 1
    • FTA_SSL_EXT.1.1: 3
    • FTA_EXT_SSL.1: 1
    • FTA_SSL.3: 5
    • FTA_SSL.4: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL_EXT.4: 1
    • FTA_SSL.4.1: 1
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_TRP.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 6
  • FAU_ARP.1: 6
  • FAU_SAR.1: 5
  • FAU_GEN.2: 5
  • FAU_SAA.1: 5
  • FAU_STG.1: 5
  • FAU_ARP.1.1: 1
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAA.1.1: 1
  • FAU_SAA.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG_EXT.1: 11
  • FAU_STG.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 8
  • FAU_STG_EXT.1.1: 2
  • FAU_GEN: 5
  • FAU_GEN.2: 5
  • FAU_GEN.1.1: 2
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 6 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 5 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_IFC.1: 5
  • FDP_IFF.1: 6
  • FDP_ROL.1: 5
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_RIP.2: 5
  • FDP_RIP.2.1: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD.1: 5
  • FIA_SOS.1: 5
  • FIA_UAU.2: 8
  • FIA_UAU.5: 5
  • FIA_UID.2: 7
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UAU.1: 2
  • FIA_UID.2.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.1: 1
  • FIA_PMG_EXT.1: 11
  • FIA_UAU_EXT.2: 11
  • FIA_UIA_EXT.1: 17
  • FIA_PSK_EXT.1: 1
  • FIA_PMG_EXT.1.1: 2
  • FIA_UAU: 1
  • FIA_UAU_EXT.2.1: 2
  • FIA_UAU.1: 3
  • FIA_UID.1: 5
  • FIA_UIA_EXT.1.1: 2
  • FIA_UIA_EXT.1.2: 2
  • FIA_UAU.7: 5
  • FIA_UAU.7.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 2 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 1 5
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 7
  • FMT_MSA.3: 10
  • FMT_MTD.1: 7
  • FMT_MOF: 10
  • FMT_MTD: 32
  • FMT_SMR.1: 5
  • FMT_MOF.1: 2
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 3
  • FMT_MTD.1: 5
  • FMT_SMF.1: 7
  • FMT_SMR.2: 5
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1: 2
  • FMT_SMR.2.1: 1
  • FMT_SMR.2.2: 1
  • FMT_SMR.2.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 5 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 5
  • FPT_STM.1.1: 1
  • FPT_APW_EXT.1: 9
  • FPT_SKP_EXT.1: 11
  • FPT_TST_EXT.1: 11
  • FPT_TUD_EXT.1: 11
  • FPT_SSP.2: 1
  • FPT_APW_EXT.1.1: 4
  • FPT_APW_EXT.1.2: 2
  • FPT_SSP.1: 1
  • FPT_SKP_EXT.1.1: 2
  • FPT_TST.1: 1
  • FPT_TST_EXT.1.1: 2
  • FPT_TUD_EXT.1.1: 2
  • FPT_TUD_EXT.1.2: 2
  • FPT_TUD_EXT.1.3: 2
  • FPT_STM.1: 7
  • FPT_STM.1.1: 1
  • FPT_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 5 7
pdf_data/st_keywords/cc_sfr/FTA
  • FTA_TSE.1: 5
  • FTA_TSE.1.1: 1
  • FTA_SSL_EXT.1: 9
  • FTA_TAB.1: 7
  • FTA_SSL: 1
  • FTA_SSL_EXT.1.1: 3
  • FTA_EXT_SSL.1: 1
  • FTA_SSL.3: 5
  • FTA_SSL.4: 4
  • FTA_SSL.3.1: 1
  • FTA_SSL_EXT.4: 1
  • FTA_SSL.4.1: 1
  • FTA_TAB.1.1: 1
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • which are out of scope), and SSH (which is provided by the operational environment: 1
  • This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
  • accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
  • out of scope: 2
  • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
  • Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13: 1
  • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 13
  • TLS:
    • SSL:
      • SSL: 2
  • SSH:
    • SSH: 71
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 3
pdf_data/st_keywords/crypto_protocol/SSH/SSH 13 71
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 2
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 3
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL 2 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KEX:
    • Key exchange: 1
    • Key Exchange: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-256: 4
      • SHA-512: 1
      • SHA-2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RNG: 6
    • RBG: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 186-3: 3
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 4253: 3
    • RFC 4741: 1
    • RFC4253: 3
    • RFC6668: 2
    • RFC5656: 3
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4254: 1
    • RFC 6668: 1
    • RFC4251: 1
    • RFC4252: 1
    • RFC4254: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_metadata//Author Juniper Denise Cater
pdf_data/st_metadata//CreationDate D:20120725095220-04'00' D:20140826155957-04'00'
pdf_data/st_metadata//ModDate D:20120725095220-04'00' D:20140908143633-04'00'
pdf_data/st_metadata//Subject EAL3 Security Target Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
pdf_data/st_metadata//Title JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8
pdf_data/st_metadata/pdf_file_size_bytes 817354 1190383
pdf_data/st_metadata/pdf_hyperlinks http://www.juniper.net/
pdf_data/st_metadata/pdf_number_of_pages 39 58
dgst 8e96ae99530fca1d a1869cea6ad1a28c